-
1
-
-
0038443107
-
A new taxonomy of web attacks suitable for efficient encoding
-
Álvarez, G., & Petrovic, S. (2003). A new taxonomy of web attacks suitable for efficient encoding. Computers & Security, 22(5), 435-449.
-
(2003)
Computers & Security
, vol.22
, Issue.5
, pp. 435-449
-
-
Álvarez, G.1
Petrovic, S.2
-
3
-
-
0003516333
-
-
Technical Report 99-15, Dept. of Computer Engineering, Chalmers University of Technology
-
Axelsson, S. (2000). Intrusion detection systems: A survey and taxonomy. Technical Report 99-15, Dept. of Computer Engineering, Chalmers University of Technology.
-
(2000)
Intrusion Detection Systems: A Survey and Taxonomy
-
-
Axelsson, S.1
-
4
-
-
10044257236
-
-
(visited 21-Apr-2006)
-
Bechhofer, S., van Harmelen, F., Hendler, J., Horrocks, I., McGuinness, D. L., Patel-Schneider, P. F., & Stein, L. A. (2004). OWL Web Ontology Language Reference. http://www.w3.org/TR/owlref/ (visited 21-Apr-2006).
-
(2004)
OWL Web Ontology Language Reference
-
-
Bechhofer, S.1
van Harmelen, F.2
Hendler, J.3
Horrocks, I.4
McGuinness, D.L.5
Patel-Schneider, P.F.6
Stein, L.A.7
-
7
-
-
0036871268
-
Internet infrastructure security: A taxonomy
-
Chakrabarti, A., & Manimaran, G. (2002). Internet infrastructure security: A taxonomy. IEEE Internet Computing, 16(6), 13-21.
-
(2002)
IEEE Internet Computing
, vol.16
, Issue.6
, pp. 13-21
-
-
Chakrabarti, A.1
Manimaran, G.2
-
8
-
-
84976766949
-
The entity-relationship model-toward a unified view of data
-
Chen, P. P.-S. (1976). The entity-relationship model-toward a unified view of data. ACM Transactions on Database Systems (TODS), 1(1), 9-36.
-
(1976)
ACM Transactions on Database Systems (TODS)
, vol.1
, Issue.1
, pp. 9-36
-
-
Chen, P.P.-S.1
-
9
-
-
0033293396
-
Towards a taxonomy of intrusiondetection systems
-
Debar, H., Dacier, M., & Wespi, A. (1999). Towards a taxonomy of intrusiondetection systems. Computer Networks, 31, 805-822.
-
(1999)
Computer Networks
, vol.31
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
11
-
-
33646148762
-
Toward a security ontology
-
Donner, M. (2003). Toward a security ontology. IEEE Security and Privacy, 1(3), 6-7.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.3
, pp. 6-7
-
-
Donner, M.1
-
12
-
-
58149365542
-
Toward principles for the design of ontologies used for knowledge sharing
-
Gruber, T. R. (1995). Toward principles for the design of ontologies used for knowledge sharing. International Journal of Human-Computer Studies, 43(5-6), 907-928.
-
(1995)
International Journal of Human-Computer Studies
, vol.43
, Issue.5-6
, pp. 907-928
-
-
Gruber, T.R.1
-
15
-
-
17444423290
-
Sociotechnical architecture for online privacy
-
Jutla, D. N., & Bodorik, P. (2005). Sociotechnical architecture for online privacy. IEEE Security and Privacy, 3(2), 29-39.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.2
, pp. 29-39
-
-
Jutla, D.N.1
Bodorik, P.2
-
16
-
-
33646699357
-
Security ontology for annotating resources
-
In, LNCS, Springer-Verlag
-
Kim, A., Luo, J., & Kang, M. (2005). Security ontology for annotating resources. In Proceedings of the On the Move to Meaningful Internet Systems: CoopIS, DOA, and ODBASE, LNCS 3761, (pp. 1483-1499). Springer-Verlag.
-
(2005)
Proceedings of the on the Move to Meaningful Internet Systems: CoopIS, DOA, and ODBASE
, vol.3761
, pp. 1483-1499
-
-
Kim, A.1
Luo, J.2
Kang, M.3
-
17
-
-
28944449676
-
Ontologies in bioinformatics and systems biology
-
In W. Dubitzky, & F. Azuaje (Eds.), SpringerVerlag
-
Lambrix, P. (2004). Ontologies in bioinformatics and systems biology. In W. Dubitzky, & F. Azuaje (Eds.), Artificial Intelligence Methods and Tools for Systems Biology, (pp. 129-146). SpringerVerlag.
-
(2004)
Artificial Intelligence Methods and Tools for Systems Biology
, pp. 129-146
-
-
Lambrix, P.1
-
18
-
-
33646165260
-
A framework for aligning ontologies
-
In, LNCS, Springer-Verlag
-
Lambrix, P., & Tan, H. (2005). A framework for aligning ontologies. In Proceedings of the 3rd Workshop on Principles and Practice of Semantic Web Reasoning, LNCS 3703, 17-31. Springer-Verlag.
-
(2005)
Proceedings of the 3rd Workshop on Principles and Practice of Semantic Web Reasoning
, vol.3703
, pp. 17-31
-
-
Lambrix, P.1
Tan, H.2
-
19
-
-
77954470646
-
Ontology alignment and merging
-
In Burger, A., Davidson, D., and Baldock, R., editors, SpringerVerlag. To appear
-
Lambrix, P., & Tan, H. (2007). Ontology alignment and merging. In Burger, A., Davidson, D., and Baldock, R., editors, Anatomy Ontologies for Bioinformatics: Principles and Practice. SpringerVerlag. To appear.
-
(2007)
Anatomy Ontologies for Bioinformatics: Principles and Practice
-
-
Lambrix, P.1
Tan, H.2
-
20
-
-
84919968378
-
Biological ontologies
-
In Baker, C. J. and Cheung, K.-H., editors, Springer-Verlag
-
Lambrix, P., Tan, H., Jakoniene, V., & Strömbäck, L. (2007). Biological ontologies. In Baker, C. J. and Cheung, K.-H., editors, Semantic Web: Revolutionizing Knowledge Discovery in the Life Sciences, (pp. 85-99). Springer-Verlag.
-
(2007)
Semantic Web: Revolutionizing Knowledge Discovery in the Life Sciences
, pp. 85-99
-
-
Lambrix, P.1
Tan, H.2
Jakoniene, V.3
Strömbäck, L.4
-
22
-
-
0026219884
-
Enabling technology for knowledge sharing
-
Neches, R., Fikes, R., Finin, T. W., Gruber, T. R., Patil, R., Senator, T. E., & Swartout, W. R. (1991). Enabling technology for knowledge sharing. AI Magazine, 12(3), 36-56.
-
(1991)
AI Magazine
, vol.12
, Issue.3
, pp. 36-56
-
-
Neches, R.1
Fikes, R.2
Finin, T.W.3
Gruber, T.R.4
Patil, R.5
Senator, T.E.6
Swartout, W.R.7
-
23
-
-
26444492656
-
Ontologybased policy specification and management
-
In, LNCS, Springer-Verlag
-
Nejdl, W., Olmedilla, D., Winslett, M., & Zhang, C. C. (2005). Ontologybased policy specification and management. In Proceedings of the 2nd European Semantic Web Conference (ESCW'05), LNCS 3532, 290-302. Springer-Verlag.
-
(2005)
Proceedings of the 2nd European Semantic Web Conference (ESCW'05)
, vol.3532
, pp. 290-302
-
-
Nejdl, W.1
Olmedilla, D.2
Winslett, M.3
Zhang, C.C.4
-
26
-
-
70350684549
-
-
Oxford University Press, Oxford Reference Online. Oxford University press
-
Oxford University Press (2004). A Dictionary of Computing. Oxford Reference Online. Oxford University press.
-
(2004)
A Dictionary of Computing
-
-
-
30
-
-
22944436485
-
Owl pizzas: Practical experience of teaching owl-dl: Common errors & common patterns
-
In, LNCS, Springer-Verlag
-
Rector, A., Drummond, N., Horridge, M., Rogers, J., Knublauch, H., Stevens, R., Wang, H., & Wroe, C. (2004). OWL pizzas: Practical experience of teaching OWL-DL: Common errors & common patterns. In Proceedings of the 14th International Conference of Engineering Knowledge in the Age of the SemanticWeb (EKAW'04), LNCS 3257, pages 63-81. Springer-Verlag.
-
(2004)
Proceedings of the 14th International Conference of Engineering Knowledge in the Age of the SemanticWeb (EKAW'04)
, vol.3257
, pp. 63-81
-
-
Rector, A.1
Drummond, N.2
Horridge, M.3
Rogers, J.4
Knublauch, H.5
Stevens, R.6
Wang, H.7
Wroe, C.8
-
32
-
-
34548158488
-
An ontology for network security attacks
-
In, LNCS, Springer-Verlag
-
Simmonds, A., Sandilands, P., & van Ekert, L. (2004). An ontology for network security attacks. In Proceedings of the 2nd Asian Applied Computing Conference (AACC'04), LNCS 3285, 317-323. Springer-Verlag.
-
(2004)
Proceedings of the 2nd Asian Applied Computing Conference (AACC'04)
, vol.3285
, pp. 317-323
-
-
Simmonds, A.1
Sandilands, P.2
van Ekert, L.3
-
33
-
-
32844474610
-
Achieving privacy in trust negotiations with an ontology-based approach
-
Squicciarini, A. C., Bertino, E., Ferrari, E., & Ray, I. (2006). Achieving privacy in trust negotiations with an ontology-based approach. IEEE Transactions on Dependable and Secure Computing, 3(1), 13-30.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.1
, pp. 13-30
-
-
Squicciarini, A.C.1
Bertino, E.2
Ferrari, E.3
Ray, I.4
-
35
-
-
0034332545
-
Ontology-based knowledge representation for bioinformatics
-
Stevens, R., Goble, C. A., & Bechhofer, S. (2000). Ontology-based knowledge representation for bioinformatics. Briefings in Bioinformatics, 1(4), 398-414.
-
(2000)
Briefings in Bioinformatics
, vol.1
, Issue.4
, pp. 398-414
-
-
Stevens, R.1
Goble, C.A.2
Bechhofer, S.3
-
37
-
-
33744502660
-
An ontology-based e-learning system for network security
-
In, IEEE
-
Takahashi, Y., Abiko, T., Negishi, E., Itabashi, G., Kato, Y., Takahashi, K., & Shiratori, N. (2005). An ontology-based e-learning system for network security. In Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA'05), 1, 197-202. IEEE.
-
(2005)
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA'05)
, vol.1
, pp. 197-202
-
-
Takahashi, Y.1
Abiko, T.2
Negishi, E.3
Itabashi, G.4
Kato, Y.5
Takahashi, K.6
Shiratori, N.7
-
38
-
-
33646150432
-
An ontology-based approach to information systems security management
-
In Gorodetsky, V., Kotenko, I., and Skormin, V., editors, LNCS, Springer-Verlag
-
Tsoumas, B., Dritsas, S., & Gritzalis, D. (2005). An ontology-based approach to information systems security management. In Gorodetsky, V., Kotenko, I., and Skormin, V., editors, Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS'05), LNCS 3685, 151-164. Springer-Verlag.
-
(2005)
Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS'05)
, vol.3685
, pp. 151-164
-
-
Tsoumas, B.1
Dritsas, S.2
Gritzalis, D.3
-
39
-
-
2942530528
-
Using daml+oil to classify intrusive behaviors
-
Undercoffer, J., Joshi, A., Finin, T., & Pinkston, J. (2004). Using DAML+OIL to classify intrusive behaviors. The Knowledge Engineering Review, (pp. 221-241).
-
(2004)
The Knowledge Engineering Review
, pp. 221-241
-
-
Undercoffer, J.1
Joshi, A.2
Finin, T.3
Pinkston, J.4
-
40
-
-
0038819499
-
A taxonomy for information security technologies
-
Venter, H. S., & Eloff, J. H. P. (2003). A taxonomy for information security technologies. Computers & Security, 22(4), 299-307.
-
(2003)
Computers & Security
, vol.22
, Issue.4
, pp. 299-307
-
-
Venter, H.S.1
Eloff, J.H.P.2
-
41
-
-
1942521938
-
Taxonomy of security considerations and software quality
-
Wang, H., & Wang, C. (2003). Taxonomy of security considerations and software quality. Communications of the ACM, 46(6), 75-78.
-
(2003)
Communications of the ACM
, vol.46
, Issue.6
, pp. 75-78
-
-
Wang, H.1
Wang, C.2
|